Columns

Best Practices

// by Hank Glauser

Meeting the Requirements of the SAFE Port Act

An old idea has been reintroduced that has the potential of meeting the elusive requirements of the SAFE Port Act without killing the economy in the process. The proposed solution, the Portunus Concept developed by Lawrence Livermore National Laboratory, proposes a set of offshore ports that are close enough to shore to support a vibrant… Keep Reading

// by Homeland Security Today

DHS Reverse Industry Day to Focus on Acquisition, Technology Crossroads

DHS Chief of Procurement Soraya Correa announced Jan. 8 that the department plans to host its fifth Reverse Industry Day on Jan. 31. Industry Day V will focus on “Advancing the Dialogue: Where Acquisition, Innovation, Cybersecurity, and Technology Intersect.” Under Secretary for Management Claire M. Grady will deliver the day’s keynote address. “Reverse Industry Days have… Keep Reading

Placeholder
// by Homeland Security Today

21st Century Information-Sharing and Communication Requirements Pose Significant Challenges

First responders in the 21st century increasingly face multifaceted active threat scenarios. The complexity of recent national and global attacks, as well as the potential of extreme natural disasters and weather emergencies, challenge those charged with saving lives and ensuring the best possible outcomes during these events more than ever. While the challenges seem more… Keep Reading

// by Homeland Security Today

Cyber Security and the Insider: Is the Threat What It Appears?

The House recently passed the Department of Homeland Security Insider Threat and Mitigation Act of 2017 (HR 666), a bill to tighten defenses against insider threats. This comes just months after another National Security Agency (NSA) contractor, Harold Martin, allegedly stole sensitive government information. Martin was arrested by the FBI in August 2016 and recently… Keep Reading

// by Jay Brainard

EXCLUSIVE: TSA Official – Active Shooter Response: Increasing Your Options

For more than a decade, Immediate Action Rapid Deployment (IARD) has become the universal technique used by law enforcement to neutralize the active shooter. While IARD — a police tactic where first responders, typically regular police officers, actively confront a developing high-risk crisis — is the most widely accepted means of eliminating the threat, the… Keep Reading

// by Homeland Security Today

Improving Homeland Security Command Center Situational Awareness

Picture yourself in a Homeland Security Operations Center in the midst of a mission to safeguard a public event. You are surrounded by displays, each feeding information from various multiple classified networks. Some information is visual, some textual, and some is a mix of both. You are surrounded by a flood of information flow that… Keep Reading

// by Homeland Security Today

Forecasting Risk: How to Maximize Assessment Efforts Using Minimal Resources

Many organizations commit significant resources to forecast a market’s growth potential. Before investing in a company, it is likely we would review a summary prospectus of their potential earnings. We also look to the National Weather Service for a forecast to determine our resource needs for a weather-dependent activity, days or possibly weeks, in advance.… Keep Reading

// by Homeland Security Today

Cybersecurity and Critical Infrastructure Protection in 2016

The annual National Cybersecurity Awareness Month in October presents the cybersecurity stakeholder community with a fresh opportunity to address basic gaps in cybersecurity protection and preparedness. The goal is to improve overall security and resilience while making the nation safer and more secure. Much of the media and public attention in recent years has been… Keep Reading

// by Homeland Security Today

Fifteenth Anniversary of 9/11 – Where Are We?

With the 15th anniversary of September 11, 2001 soon to arrive, the United States is now engaged in the longest war in its history. Coined by President Bush on the day of 9/11, the term “War on Terror” describes a general conflict against all global Islamist terror groups, especially Al Qaeda, the Taliban and associated… Keep Reading

// by Homeland Security Today

Why DoD Test Ranges Don’t Have to Cause ‘Predictable Permanent Thunderstorms’

We’ve all been there: The pilot has informed the cabin that today’s flight will be re-routed around a bank of thunderstorms, ultimately resulting in a late arrival, missed connections and the general malaise which often can define air travel today. Similar to a bank of thunderstorms, the US Department of Defense (DoD) maintains dozens of… Keep Reading

// by Homeland Security Today

End-to-end Encryption: Nuisance or Safety Net?

Electronically maintained personal and financial data has been the subject of public and government attention for many years now., Feature articles by major publications, such as the New York Times and the Washington Post, have raised serious concerns about lost, stolen or misused personal and financial information. These losses have been so extensive that they… Keep Reading

// by Homeland Security Today

Business Email Compromise: Hackers and Competitors Infiltrate via Social Engineering

Everyone in information security should know that business email compromise (BEC) attacks are on the rise. However, many security professionals may not realize how pervasive these threats have become; the rate of increase in BEC is remarkable. The FBI released an alert on April 4 that included some sobering statistics about fraudulent wire transfer requests:… Keep Reading

// by Homeland Security Today

Security from Above: How Earth Observation Helps to Keep America Safe

Less than two weeks after the September 11, 2001 attacks in New York, Virginia and Pennsylvania, the first Director of the Office of Homeland Security was appointed and a new phrase entered the English lexicon. Taken from a 1990s Pentagon report, the phrase ‘homeland security’ was designed to reassure the people of the United States… Keep Reading

// by Homeland Security Today

Eating Your Own Cyber Dog Food: An Inward Look at Cybersecurity

During recent conversations with several executives from cybersecurity business consultants that support the US Government, I asked who they’d hold accountable for a breach of their own business’ network. I was not overly surprised bythe number one answer, “I don’t know,” followed by, “not me,” and finally (at least one had a plan) the “Chief… Keep Reading

// by Homeland Security Today

Why Software Patching is Essential in Today’s World

A few years back, business came to a grinding halt for a European supermarket chain when it was infected with the Conficker virus. The virus caused the system to slowly use up all the system resources at more than 500 stores and 20,000 devices until they all stopped working, leaving all the company’s stores virtually… Keep Reading

1 2 3 7
Go to Top
X
X